.

Wednesday, May 6, 2020

Cloud Computer Security Techniques and Tactics †MyAssignmenthelp

Question: Discuss about the Cloud Computer Security Techniques and Tactics. Answer: Introduction Cloud computing refers to the process through which individuals or organizations utilize network provided or remote servers that are hosted on the internet to manage, process and store data, instead of utilizing a local computer for the same. The activity cloud computing has recently been embraced by a large number of business organizations and individuals, who seem to have some important activities that they feel the importance of carrying out using different servers from the local ones or the personal computers. A good example is a business organization needing to store its trade secret information and other important business documents in a safe location that is extremely difficult for any individual to obtain easily. In such an occasion, the individual can simply consider the utilization of a cloud server where this information will be stored, since, unlike the local servers, cloud servers are more secure and extremely difficult for people to hack or obtain access easily. This st udy provides a clear explanation of the means through which business organizations should embrace and utilize cloud computing technologies to obtain significant improvements of how they operate (Vaquero, Caceres, Hierro, 2012). Research Aims and Objectives The research under study has some important aims and objectives which it is required to meet throughout its development. The first aim of the research is to attain an understanding of the perspective that business organizations have regarding the aspect of cloud computing. Perspective is a significantly important aspect that has the power and capability of determining the means through which an individual or organization reacts towards something. When a business has a positive perspective towards a certain project, for example, that business is likely to have a lot of interest in establishing that project. Time and resources are likely to be invested in pursuit of the deliverables for that project. For cloud computing in the world of business, the perspective that business organizations have on this technological advancement is likely to determine whether they are willing to try its implementation in their operations or not. The research study, therefore, aims to determine the perspe ctive that majority of the business organizations have on cloud computing (Safonov, 2017). The other main aim that this research has is the assessment of the means through which cloud computing can be beneficial to business organizations. The research study has a purpose of providing important information to business organizations regarding the topic of cloud computing. Among the many aspects that businesses would be interested in are the aspects of how they can manage to utilize the cloud computing service to their operations and manage to benefit. The study has the aim of ensuring that business organizations attain the means through which they can manage to implement effectiveness of operation through cloud computing. The research study will therefore assess and provide information on these methods and their importance. The third main aim of this research study is assessing any possible negative impacts that businesses might obtain through their use of cloud computing. Like all other technologies that are currently embraced and used, cloud computing also has some disadvantages for all the individuals and organizations that utilize it. It is extremely important for the organizations that will learn its benefits and the means to which it can help them improve also attain an understanding of the means to which it exposes them to risk simply by using it. The research study is thus aimed at providing sufficient research results regarding the ways through which organizations can be affected negatively by using cloud computing (Toraldo, 2012). An objective of the study is to help business organizations attain the most appropriate ways of operation which will help them manage to increase their operations and improve significantly, to avoid aspects of being less effective in their operations. Technological advancements have been one of the main ways through which business organizations have been improving their operations significantly. The study aims to help the business obtain a clear understanding of the benefits that they are likely to obtain simply by using cloud computing in their operations. Cloud computing is one of the most recent technological advancements that has been of significant importance to a large number of individuals and organizations. Currently, it is utilized by the large organizations which need large storage and computing power that may be considered unwise for the organization to purchase for external use within the organizations. Individuals, therefore, consider the utilization of cloud computing services to utilize the high computing power offered by computing organizations and only pay for it when they need it. Cloud computing is also utilized in helping organizations that have the need or requirement of large storage space for information or data to have storage places where they can store data for a fee. This aspect is sometimes considered better than purchasing organization local storage where the information is stored in (Josyula, Orr, Page, 2012). How cloud computing works Cloud computing is an establishment made by organizations where they decide to establish extremely strong servers with the capability of offering their processing power and storage to clients. These servers are established to be used by a large number of clients and thus for that reason; they are provided with extremely high computing power and very large storage spaces. One major issue that cloud computing service providers face is the need for clients to have their computers for use in their work. If for example, a client is seeking to utilize certain very strong software in his or her operation, a need might arise for that client to have a single computer for her own. This becomes a problem because in case the organization has more than a thousand clients with a similar requirement as that, then about a thousand computers would be required (Ruparelia, 2016). To solve this issue completely, architectures of virtualization are used, thus making sure that clients view themselves as having their computers when they operate using the main organizational server which has a very high computing power and large storage space. With the virtualization architecture in place, the only necessity that cloud computing service providers have is a very strong computing power and significantly large storage space that will be sufficient for their clients. Clients seek cloud computing services for some reasons. An individual or organization may, for example, require a storage space for a certain file or document for certain duration of time, while another client may require a strong computing power to run a software for a while. The service rendering organizations for these services charge a certain amount of money depending on the resource needed and the time that an individual requires to have that resource (Jamsa, 2013). Cloud computing services are offered to clients through the internet. If for example, an individual is running software through these services, he or she requires being fully connected to the internet for that software to run smoothly. Disconnection from the internet automatically disconnects the individual from using the service, and thus cloud computing service offering or utilization completely relies upon the utilization of the internet. The other important aspect of consideration is the issue of security, Security is important to consider because all the information is transmitted from the clients computer to the cloud computing services through a network. All networks are also vulnerable from attacks by individuals like hackers, who have the skills and ability to obtain unauthorized access to services and platforms easily. With this regard, therefore, cloud computing service providers have established a lot of security precautions which are aimed at ensuring that any informatio n provided by individuals through their networks manage to travel safely without being accessed by any third party that is not authorized to access it (Murugesan, Bojanova, 2015). Organizations that currently utilize cloud computing services are those organizations that are conversant with these services and the benefits that they potentially have for them. To begin with, an organization that occasionally requires high computing power for aspects like data analysis can consider not purchasing a very strong computer because when the data analysis is not being used, the computers computing power will be being underutilized. For such an organization, cloud computing services are a significantly better option. Other organizations that utilize cloud computing services are those organizations that need to securely store business operational documents or files when they are aware that their organizational, local network is at high risk of providing unauthorized access to individuals who have high computing skills. For such organizations, storing the information in the cloud would solve the safety problem (Hurwitz, 2009). Research Significance and Innovation This research is of extreme importance. To begin with, individuals have the chance and ability to attain an understanding of the strategies that they can utilize to take advantage of the cloud computing technology and manage to improve their operations significantly. The research study will guide majority of the business organizations on the means through which cloud computing technology can be of benefit to them. It will also inform the business that is already utilizing this technology on the available risks that can cause them problems for using the technology. Understanding the risks involved will help the business organizations manage to establish strategic activities that can be utilized to mitigate the risks in case they occur. It is however extremely difficult for a business organization to establish risk mitigation strategies without understanding the risks. This research is therefore significantly beneficial for all business organizations, whether they are using cloud compu ting services or not (Mahmood, Hill, 2011). The research study is also completely different or innovative compared to other research studies that have been carried out concerning this area. Majority of the studies provide explanations regarding the importance of cloud computing and the means through which it can be utilized to provide value to organizations. Unlike these studies, however, this research has its main focus on the perspectives that business organizations have on cloud computing, and it inclusively describes aspects of the negative impact that the technology has on business organizations. The description of the negativities brought about by the technology makes the study unique, since the majority of other research studies are based on the benefits that cloud computing has towards organizations (Furht, Escalante, 2010). The research study will utilize some important research methods to obtain sufficient research data that will provide information regarding the research. The first research method that will be highly beneficial to this research is the analysis of literature authored by other researchers. Since cloud computing is not a recent issue that came into existence the other day, many researchers have conducted research studies on the topic and provided literal sources with their findings. A review of their research and results will provide more information on this topic and provide clarity on many issues that the research aims to study. The review will also help in the identification of research flaws that other researchers have carried out, and thus with the information, those flaws will be avoided in this research (Josyula, Orr, Page, 2012). The other research method that will be utilized in gathering data is a survey method. The survey method helps individuals to provide information regarding a certain topic using some guided questions. Since the research is based on the topic of perspectives for business organizations, the survey will be aimed and specified for nosiness owners or business organization employees. Its questions will require answers regarding the organizational perspectives concerning the business and the means through which those perspectives can be based on aspects regarding the importance of effectiveness in their operations. The establishment of the survey will be highly beneficial since it will help in providing information on the importance of cloud computing from the perspective of organizational practitioners. Survey information will provide a lot of information on the importance of cloud-based services to businesses (Buyya, Broberg, Gos?cin?ski, 2011). Another method that the research study will utilize in gathering information is the questionnaire method. Questionnaires are utilized to gather more information with better explanations from individuals. Unlike surveys, however, questionnaires are not provided to a large number of individuals. They, however, provide explanations to the answers given and thus they are easy to understand during the research data analysis stage. In this research, questionnaires will be administered to two types of business organizations. The first type is a business organization that already utilized cloud computing services, and the next category is a business organization that has not embraced the use of cloud computing services in its operation (Halpert, 2011). Information from the first category of businesses will help to provide a clear explanation of the importance of cloud computing in business organizations. An example of a question that will be included in the questionnaire is whether the individual thinks that cloud computing services are beneficial to the business or not. Questions of this form from all the employees of the organization will help provide a clear and fully informed understanding regarding the impact of utilizing cloud computing services in an organization of that form. Information from the second category will provide information as to why many businesses do not still utilize cloud computing in their operation. An example of a question that should be included in this questionnaire is the need to understand the reason why the organization does not utilize cloud computing services. This method of research will, therefore, contribute significantly in obtaining the required research data of the organization (Antonopoulos , Gillam, 2017). Conclusion A large number of business organizations have the potential of improving their operations significantly through the utilization of cloud computing services. The problem of not understanding how these services could be of benefit to them, however, hinders these organizations from utilizing this potential and increases their effectiveness. With this regard, this research study will be of significant benefit to many business organizations currently operating with a negative perspective regarding cloud computing services. The study will also provide a clear explanation to all the organizations utilizing these services regarding the existing risks that might occur and disrupt their operations and thus explain the importance of ensuring that these organizations manage to establish important strategies for mitigating these risks in case they occur. This study is thus of significant importance to many individuals, and the research question is appropriate for research to be carried out about it effectively. (Wang, 2012). References Antonopoulos, N. Gillam, L. 2017.Cloud computing. Cham: Springer. Buyya, R., Broberg, J. Gos?cin?ski, A. 2011.Cloud computing : principles and paradigms. Hoboken, N.J: Wiley. Chao, L. 2012.Cloud computing for teaching and learning : strategies for design and implementation. Hershey, PA: Information Science Reference. Chee, B. Franklin, C. 2010.Cloud computing : technologies and strategies of the ubiquitous data center. Boca Raton: CRC Press. Debashis. 2016.Mobile cloud computing : architectures, algorithms and applications. Boca Raton: CRC Press, Taylor Francis Group. Fehling, C. 2014.Cloud computing patterns : fundamentals to design, build, and manage cloud applications. Wien: Springer. Furht, B. Escalante, A. 2010.Handbook of cloud computing. New York: Springer. Halpert, B. 2011.Auditing cloud computing : a security and privacy guide. Hoboken, N.J: John Wiley Sons. Hurwitz, J. 2009.Cloud computing for dummies. Hoboken, NJ: Wiley Pub. Jamsa, K. 2013.Cloud computing : SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones Bartlett Learning. Josyula, V., Orr, M. Page, G. 2012.Cloud computing : automating the virtualized data center. Indianapolis, Ind: Cisco Press. Josyula, V., Orr, M. Page, G. 2012.Cloud computing : automating the virtualized data center. Indianapolis, Ind: Cisco Press. Mahmood, Z. Hill, R. 2011.Cloud computing for enterprise architectures. London New York: Springer. Murugesan, S. Bojanova, I. 2015.Encyclopedia of cloud computing. Chichester, West Sussex, United Kingdom Hoboken, NJ: John Wiley Sons. Ruparelia, N. 2016.Cloud computing. Cambridge, Massachusetts: The MIT Press. Safonov, V. 2017.Trustworthy cloud computing. Hoboken, New Jersey: John Wiley Sons, Inc. Toraldo, G. 2012.OpenNebula 3 cloud computing. Birmingham: Packt Publishing. Vaquero, L., Caceres, J. Hierro, J. 2012.Open source cloud computing systems : practices and paradigms. Hershey, Pa: Information Science Reference. Wang, L. 2012.Cloud computing : methodology, systems, and applications. Boca Raton, FL: CRC Press. Winkler, J. 2011.Securing the cloud : cloud computer security techniques and tactics. Burlington, MA: Elsevier.

No comments:

Post a Comment